Vulnerability Description
The Tracking Code Manager WordPress plugin before 2.4.0 does not sanitise and escape some of its metabox settings when outputing them in the page, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Data443 | Tracking Code Manager | < 2.4.0 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/9eb21250-34bd-4600-a0a5-7c5117f69f04/ExploitThird Party Advisory
- https://wpscan.com/vulnerability/9eb21250-34bd-4600-a0a5-7c5117f69f04/ExploitThird Party Advisory
FAQ
What is CVE-2024-10309?
CVE-2024-10309 is a vulnerability with a CVSS score of 5.9 (MEDIUM). The Tracking Code Manager WordPress plugin before 2.4.0 does not sanitise and escape some of its metabox settings when outputing them in the page, which could allow users with a role as low as Contrib...
How severe is CVE-2024-10309?
CVE-2024-10309 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-10309?
Check the references section above for vendor advisories and patch information. Affected products include: Data443 Tracking Code Manager.